Dirb nikto wpscan etc

Your Brain

  • Investigate Clues:

  • /wordpress/ ... very fertile ground for an attack. User access = shell.

  • /phpmyadmin/ ... suggests there is a database ready to plunder.

  • /info.php .... gives us Kernel, hostname and OS information immediately.

Autorecon

  • multi-scan-tool runs nmap, gobuster, and more

sudo python3 autorecon.py $IP -o /home/beep/

Find neighbors: netdiscover

sudo netdiscover -r 192.168.10.0/24
netdiscover -r 192.168.10.0/24

Masscan

masscan -p22,80,443,445,1433,3389 --rate 15000 10.0.0.0/8
Fast enough, without causing DOS

1433 SQL
3389 RDP
If you run w/o 'rate', I will be too fast. Be careful

masscan pp0-65535 --rate 15000 --output-format binary --output-filename full.mass 10.0.0.0/8

-oL  ..List
-oJ  ..JSon
-oG  ..Grepable
-oB  ..Binary - fast but unreadable
-oX  ..XML
-oU  ..Unicorn

Convert Later:
masscan --read-scan full.mass --output-format xml --output-filename full.xml
masscan --read-scan full.mass --output-format grepable --output-filename full.txt

gobuster

dirb

nikto

dirsearch

  • Alternative to gobuster

Wordpress Vuln Scanner - wpscan

REF: Webapp Wordpress

cmsmap

wig

  • WebApp Information Gatherer

whatweb

Netcat Port Scanner

PowerShell Ping Sweep

Public Attack Surface

wget

uniscan

Last updated

Was this helpful?